General

  • Target

    PackageTracking.js

  • Size

    2.2MB

  • Sample

    230612-rl5n1ada7t

  • MD5

    4331a93b3bb41b1dbee33654a356e185

  • SHA1

    5a69f4e88f9ab7e6d7278ae16860c634593bfaa8

  • SHA256

    af6ece1e6be8d5511a407806c24ca95fbf9e69e6ec595830342dc748868a0d0d

  • SHA512

    2e5c3b9a29e39c167336824244868b953908bda5b7e94a02ab0549785d966792d60bed310f4df547c97c1dbccd4742f6ca570f8638c46495955d91176a64338e

  • SSDEEP

    12288:mJvm6+EhCkN1tbZvbssZ+nMXGiK5qqQvUknS+jN55EnMQ7Q0lq8JgEFJPwMhy+lQ:iR5j1DvRXG9Jy8CUPfpg59QIMrJFA

Malware Config

Extracted

Family

wshrat

C2

http://172.93.181.132:4848

Targets

    • Target

      PackageTracking.js

    • Size

      2.2MB

    • MD5

      4331a93b3bb41b1dbee33654a356e185

    • SHA1

      5a69f4e88f9ab7e6d7278ae16860c634593bfaa8

    • SHA256

      af6ece1e6be8d5511a407806c24ca95fbf9e69e6ec595830342dc748868a0d0d

    • SHA512

      2e5c3b9a29e39c167336824244868b953908bda5b7e94a02ab0549785d966792d60bed310f4df547c97c1dbccd4742f6ca570f8638c46495955d91176a64338e

    • SSDEEP

      12288:mJvm6+EhCkN1tbZvbssZ+nMXGiK5qqQvUknS+jN55EnMQ7Q0lq8JgEFJPwMhy+lQ:iR5j1DvRXG9Jy8CUPfpg59QIMrJFA

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks